An update for kernel is now available for Red Hat Enterprise Linux 6.7Extended Update Support.

Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.

Security Fix(es):

* A use-after-free vulnerability was found in the kernels socket recvmmsgsubsystem. This may allow remote attackers to corrupt memory and may allowexecution of arbitrary code. This corruption takes place during the errorhandling routines within __sys_recvmmsg() function. (CVE-2016-7117,Important)

Bug Fix(es):

* Previously, guest virtual machines (VMs) on a Hyper-V server cluster gotin some cases rebooted during the graceful node failover test, because thehost kept sending heartbeat packets independently of guests responding tothem. This update fixes the bug by properly responding to all the heartbeatmessages in the queue, even if they are pending. As a result, guest VMs nolonger get rebooted under the described circumstances. (BZ#1397737)

* Previously, memory corruption by copying data into the wrong memorylocations sometimes occurred, because the __copy_tofrom_user() function wasreturning incorrect values. This update fixes the __copy_tofrom_user()function so that it no longer returns larger values than the number ofbytes it was asked to copy. As a result, memory corruption no longer occursin he described scenario. (BZ#1398182)

4. Solution:

For details on how to apply this update, which includes the changesdescribed in this advisory, refer to: